Author: jacobo

Penetration Testing Wiki

Best Portswigger Burpsuite Pro plugins in 2021

protobuf decoding https://github.com/nccgroup/blackboxprotobuf J2EEScan https://portswigger.net/bappstore/7ec6d429fed04cdcb6243d8ba7358880 ParamMiner https://portswigger.net/bappstore/17d2949a985c4b7ca092728dba871943 Upload Scanner https://portswigger.net/bappstore/b2244cbb6953442cb3c82fa0a0d908fa Retire.js https://portswigger.net/bappstore/36238b534a78494db9bf2d03f112265c Msgpack https://portswigger.net/bappstore/c199ec3330864d548ff7d6bf761960ba Turbo Intruder https://portswigger.net/bappstore/9abaa233088242e8be252cd4ff534988 More on https://pentestwiki.org/tools-for-web-penetration-testing/

How to disguise a covert channel with netcat like a harmless command

One of the most important steps after the post-exploitation is to cover our activities and maintain access to the target. In Linux, BSD or Unix we can easily disguise a process name to hide our covert operations. We can abuse the C function execv() to show one command but execute one completely different. In the…
Read more

Google Dork

Google Dork is an advanced Google search query using special commands such as allinurl, allintitle, etc to leverage Google to find public information. Is also a good way to perform passive reconnaissance. Offensive Security has the major Google Dork database called GHDB: https://www.exploit-db.com/google-hacking-database

How to record your terminal💻 session on Linux🐧

Intro When writting an article about ethical hacking techniques I tried many ways to record my terminal and keep a good quality and resolution. If you record directly your screen with some screencast software the resolution for the letters of the terminal usually gets pixelated, so it’s not looking great. Then luckily I found terminalizer…
Read more

OpenSSL certificate from der to pem

To convert a DER certificate to PEM format, use the following openssl command:

How to intercept HTTPS Traffic from Android App

If you are interested in getting all traffic related to an specific app and you have a rooted phone, ProxyDroid is a good option: https://play.google.com/store/apps/details?id=org.proxydroid First thing before enabling the “Proxy Switch”, you have to point Proxydroid to the machine where you have BurpSuite running listening in the Wifi interface. In my case 192.168.1.134 on…
Read more

How to setup a PHP file dropper without tools

After we have compromised a machine inside a network, we need to download tools for lateral movement, local exploits to escalate privileges, etc. Knowing how to setup a file dropper is crucial. When I was doing the OSCP 24-hour exam but also when doing the training in the labs, that was very useful as I…
Read more

Advanced buffer overflow exploit by Taeho Oh

Note: Transcription from the original article written by Taeho Oh. Internet cannot forget this legend! 1. Introduction Nowadays there are many buffer overflow exploit codes. The early buffer overflow exploit codes only spawned a shell (execute “/bin/sh”). However, nowadays some of the buffer overflow exploit codes have very powerful features.For example, passing through input filtering,…
Read more

Cracking passwords with John the Ripper

If we are cracking local accounts passwords in a Unix/Linux environment. First you will need to merge “/etc/passwd” and “/etc/shadow” system files into one: Then there are two possible techniques. Technique #1: Dictionary Attack This is useful when we have a long dictionary with common passwords, so we want to audit that no user is…
Read more

How to scan ports with netcat

Sometimes when doing lateral movement in a penetration testing engagement, we don’t want to use nmap to keep a low footprint. There it comes netcat to the rescue which it is already installed in many Linux systems. With this command we can easily perform a port scanning for the most used ports: If you are…
Read more